Skip to content
Snippets Groups Projects
  1. Aug 29, 2020
    • James Kirsch's avatar
      Add support for encrypting Ironic API · 316b0496
      James Kirsch authored
      This patch introduces an optional backend encryption for the Ironic API
      and Ironic Inspector service. When used in conjunction with enabling
      TLS for service API endpoints, network communcation will be encrypted
      end to end, from client through HAProxy to the Ironic service.
      
      Change-Id: I3e82c8ec112e53f907e89fea0c8c849072dcf957
      Partially-Implements: blueprint add-ssl-internal-network
      Depends-On: https://review.opendev.org/#/c/742776/
      316b0496
  2. Aug 28, 2020
  3. Aug 25, 2020
    • Mark Goddard's avatar
      Drop support for /etc/modules · 98e8a436
      Mark Goddard authored
      We no longer support any OS distros that use /etc/modules.
      
      Change-Id: Ic41cad64ed0479a0cef7321aeed191fe06a30e8f
      98e8a436
    • wu.chunyang's avatar
      add region name for tasks · 60dc0128
      wu.chunyang authored
      when use multiple regions, those tasks always get a wrong endpoint.
      
      Change-Id: Ie164687b2ffd80cedf8a00e7f705b73fccd416e2
      60dc0128
  4. Aug 24, 2020
  5. Aug 22, 2020
  6. Aug 21, 2020
  7. Aug 19, 2020
    • wu.chunyang's avatar
      remove obsolete configurations · 3c312a4d
      wu.chunyang authored
      remove cluster_interface from project.
      update storage_interface docs.and remove
      storage_interface_address variable
      
      Change-Id: I3f811db988234f94b5ed0cc9d24233f70784f58d
      3c312a4d
    • Pierre Riteau's avatar
      Add workaround for keystonemiddleware/neutron memcached issue · 5a52d8e4
      Pierre Riteau authored
      There is an issue where keystonemiddleware connections to memcached from
      neutron-server grow beyond configured values [1], eventually reaching
      the maximum number of connections accepted by memcached servers. Other
      services do not appear to be affected by this issue.
      
      A workaround is to use the advanced memcached pool. Despite its
      documentation claiming to only work with Python 2, it appears to work
      fine on Python 3.
      
      [1] https://bugs.launchpad.net/keystonemiddleware/+bug/1883659
      
      Change-Id: Ifbbc2022839cbc575848d830600241c61603c80b
      Closes-Bug: #1892210
      5a52d8e4
    • Jegor van Opdorp's avatar
      Add cinder auth config to nova-cell nova.conf.j2 · de16013b
      Jegor van Opdorp authored
      Fixes an issue during deleting evacuated instances with encrypted block
      devices.
      
      Change-Id: I9b9b689ef7e1e41b597e2c5f6b96f3ed011193c5
      Closes-Bug: 1891462
      Related-Bug: 1850279
      de16013b
    • Florian LEDUC's avatar
      Use iSCSI multipath for libvirt · 56710de5
      Florian LEDUC authored
      * Multipath daemon allows to reach block devices
      via multiple paths for better resiliency and performance.
      Multipathd periodically checks the failed iscsi paths
      and maintains a list of valid paths. Libvirt can use more
      than one iSCSI path when option volume_use_multipath is set
      and when multipathd enabled.
      
      Change-Id: I54629656803c4989f7673e8c69d2a820609b5960
      Implements: blueprint nova-libvirt-multipath-iscsi
      56710de5
    • likui's avatar
      Fix ownership and permissions of admin-openrc.sh · 16f97867
      likui authored
      
      Previously the post-deploy.yml playbook was executed with become: true,
      and the admin-openrc.sh file templated without an owner or mode
      specified. This resulted in admin-openrc.sh being owned by root with 644
      permissions.
      
      This change creates the file without become: true, and explicitly sets
      the owner to the user executing Ansible, and the mode to 600.
      
      Co-Authored-By: default avatarMark Goddard <mark@stackhpc.com>
      
      Closes-Bug: #1891704
      
      Change-Id: Iadf43383a7f2bf377d4666a55a38d92bd70711aa
      16f97867
    • Rafael Weingärtner's avatar
      Standardize use and construction of endpoint URLs · f425c067
      Rafael Weingärtner authored
      
      The goal for this push request is to normalize the construction and use
       of internal, external, and admin URLs. While extending Kolla-ansible
       to enable a more flexible method to manage external URLs, we noticed
       that the same URL was constructed multiple times in different parts
       of the code. This can make it difficult for people that want to work
       with these URLs and create inconsistencies in a large code base with
       time. Therefore, we are proposing here the use of
       "single Kolla-ansible variable" per endpoint URL, which facilitates
       for people that are interested in overriding/extending these URLs.
      
      As an example, we extended Kolla-ansible to facilitate the "override"
      of public (external) URLs with the following standard
      "<component/serviceName>.<companyBaseUrl>".
      Therefore, the "NAT/redirect" in the SSL termination system (HAproxy,
      HTTPD or some other) is done via the service name, and not by the port.
      This allows operators to easily and automatically create more friendly
       URL names. To develop this feature, we first applied this patch that
       we are sending now to the community. We did that to reduce the surface
        of changes in Kolla-ansible.
      
      Another example is the integration of Kolla-ansible and Consul, which
      we also implemented internally, and also requires URLs changes.
      Therefore, this PR is essential to reduce code duplicity, and to
      facility users/developers to work/customize the services URLs.
      
      Change-Id: I73d483e01476e779a5155b2e18dd5ea25f514e93
      Signed-off-by: default avatarRafael Weingärtner <rafael@apache.org>
      f425c067
    • Radosław Piliszek's avatar
      Fix tz handling for newly introduced services · 479fb85d
      Radosław Piliszek authored
      We missed to ensure new neutron switch use the new condition for
      timezone file mounting.
      
      Change-Id: I838e526b930d5276d3ce24f5188262af7eb33280
      Closes-Bug: #1882553
      479fb85d
  8. Aug 17, 2020
  9. Aug 15, 2020
    • James Kirsch's avatar
      Add support for encrypting Nova API · d6251506
      James Kirsch authored
      This patch introduces an optional backend encryption for the Nova API
      service. When used in conjunction with enabling TLS for service API
      endpoints, network communcation will be encrypted end to end, from
      client through HAProxy to the Nova service.
      
      Change-Id: I48e1540b973016079d5686b328e82239dcffacfd
      Partially-Implements: blueprint add-ssl-internal-network
      d6251506
  10. Aug 13, 2020
    • Bharat Kunwar's avatar
      Deploy neutron-mlnx-agent and neutron-eswitchd containers · 4809462f
      Bharat Kunwar authored
      Change-Id: I173669bdf92b1f2ea98907ba16808ca3c914944c
      4809462f
    • Mark Goddard's avatar
      Prevent overwriting existing Keystone Fernet keys · 8389140f
      Mark Goddard authored
      Steps to reproduce:
      
      * Deploy a cloud
      * Add another controller to the inventory
      * Deploy to the new controller using --limit:
      
      kolla-ansible deploy --limit new-controller
      
      Expected results:
      
      The new controller uses the cluster's existing fernet keys.
      
      Actual results:
      
      New fernet keys are generated on the new controller, and pushed out to
      the existing controllers. This invalidates tokens created from those
      keys.
      
      This change prevents the above scenario from happening, by failing the
      deployment if there are no hosts with existing Ferney keys to
      distribute, and not all Keystone hosts are in the target host list.
      
      Closes-Bug: #1891364
      
      Change-Id: If0c0e038b77fc010a3a017f9841a674d53b16457
      8389140f
    • James Kirsch's avatar
      Add Keep Alive Timeout for httpd · 19b028e6
      James Kirsch authored
      This patch introduces a global keep alive timeout value for services
      that leverage httpd + wsgi to handle http/https requests. The default
      value is one minute.
      
      Change-Id: Icf7cb0baf86b428a60a7e9bbed642999711865cd
      Partially-Implements: blueprint add-ssl-internal-network
      19b028e6
  11. Aug 12, 2020
  12. Aug 11, 2020
  13. Aug 10, 2020
    • Mark Goddard's avatar
      Mount /etc/timezone based on host OS · 146b00ef
      Mark Goddard authored
      Previously we mounted /etc/timezone if the kolla_base_distro is debian
      or ubuntu. This would fail prechecks if debian or ubuntu images were
      deployed on CentOS. While this is not a supported combination, for
      correctness we should fix the condition to reference the host OS rather
      than the container OS, since that is where the /etc/timezone file is
      located.
      
      Change-Id: Ifc252ae793e6974356fcdca810b373f362d24ba5
      Closes-Bug: #1882553
      146b00ef
    • likui's avatar
      Add trove-guestagent.conf · 38881963
      likui authored
      Add trove-guestagent.conf templates for trove-guestagent service.
      Default the Guest Agent config file to be injected during instance creation.
      
      Change-Id: Id0750b84fef8e19658b27f8ae16a857e1394216e
      38881963
  14. Aug 07, 2020
    • Mark Goddard's avatar
      Fix Barbican client (Castellan) with TLS (part 2) · 97e26b49
      Mark Goddard authored
      This patch is a continuation of
      I6a174468bd91d214c08477b93c88032a45c137be for the nova-cell role, which
      was missed.
      
      The Castellan (Barbican client) has different parameters to control
      the used CA file.
      This patch uses them.
      Moreover, this aligns Barbican with other services by defaulting
      its client config to the internal endpoint.
      
      See also [1].
      
      [1] https://bugs.launchpad.net/castellan/+bug/1876102
      
      Closes-Bug: #1886615
      
      Change-Id: I056f3eebcf87bcbaaf89fdd0dc1f46d143db7785
      97e26b49
  15. Aug 06, 2020
  16. Aug 04, 2020
  17. Aug 03, 2020
    • Mark Goddard's avatar
      Fix play hosts for ironic, monasca, neutron, nova · 9bca246b
      Mark Goddard authored
      Some plays were not applied to all groups referenced by the services
      they deploy. In most cases this works fine, but if the default inventory
      is modified this may cause problems where containers are not deployed to
      hosts in the missing groups, if they are not a member of other groups
      that the play is targeted to.
      
      This change syncs up the play hosts for all services.
      
      Closes-Bug: #1889387
      
      Change-Id: I6b92d8e53a29b06a065e0611840140d09c8a6695
      9bca246b
Loading